Avatars
Dec 16, 2010 23:35:22 GMT -5
Post by Jake on Dec 16, 2010 23:35:22 GMT -5
Avatars are the digital navigators of the net. There are two types of avatars that are created through different means; Personal (user operated/assisted) and Rogue (solo/user free).
Personal Avatars: These are the most commonly seen avatars that travel on the global network. All personal avatars start out as defaults on the production line, custom personality or physical traits are left unspecified until ordered after purchase, or self customized prior to purchase. Avatar terminals maintain most personal information: money, identification info, even special registration numbers for the avatar and any business related registration for the user.
Since the creation of Version 4 terminals, these avatars are given a failsafe in their design to prevent complete data deletion. Their core programming remains in either the stationary or portable terminal that the avatar is currently loaded on. When being linked into the network (via hardline connection or wifi), the core programming stays anchored to the terminal, and a virtual copy is sent to do the task that's required of it, while the core program provides an overhead view of the virtual world of the internet through the terminal's screen. Any viruses deleted or files obtained by the virtual copy get added to the data collected by the terminal when the avatar logs off. But if an avatar is deleted while still online, all files and compiled virus data are deleted with it, and the avatar will be restored back on the terminal, with all saved information prior to leaving the terminal. Note: Human characters normally only need one avatar for regular use, but can have no more than three total (but the reason for having more than one needs to be a strong, logical reason). Background avatars for maintenance are permitted as NPC only, and cannot be used for anything more than plot development.
Rogue Avatars: The main description for rogue avatars are avatars not owned or operated by a user. While most avatars are programmed and operated by Human partners, also known as Users, there have been times when Avatars are created by random digital feedback from the net. The behavior of these Rogue Avatars depend on the data that created them, this also determines if they are hostile, peaceful, annoying, or as ordinary as a personal avatar. Sometimes an avatar can become rogue if a bug is found in their programming.
While these rogue avatars can be convinced to partner up with a user, many prefer to stay solo because it is easier to live without following rules. However, rogue avatars are all software, created digitally from raw data and possessing their core programming within their virtual forms. Therefore, if a rogue avatar is deleted online, they vanish forever. If out of control, these Avatars are targeted by law enforcement, to be hunted down and terminated by any means necessary. There have even been rumors of some Rogue avatars harboring dangerous viral code in their data, making the isolation and registration (or termination if necessary) of all rogue avatars high on police priority.
When rogue avatars take a more hostile path after development, they will often enter the Underground Network, the darker side of the global network used on a regular basis (a digital underworld if you will). Here in the Underground Network, the more volatile and deranged avatars make their home, and plan out ways to wreak havoc on the semi peaceful world that the humans enjoy living in so much, usually out of spite, or just for the fun of it. Getting into the Underground net is highly discouraged unless you are a trained professional, as there is only one known gateway to enter and exit.
Personal Avatars: These are the most commonly seen avatars that travel on the global network. All personal avatars start out as defaults on the production line, custom personality or physical traits are left unspecified until ordered after purchase, or self customized prior to purchase. Avatar terminals maintain most personal information: money, identification info, even special registration numbers for the avatar and any business related registration for the user.
Since the creation of Version 4 terminals, these avatars are given a failsafe in their design to prevent complete data deletion. Their core programming remains in either the stationary or portable terminal that the avatar is currently loaded on. When being linked into the network (via hardline connection or wifi), the core programming stays anchored to the terminal, and a virtual copy is sent to do the task that's required of it, while the core program provides an overhead view of the virtual world of the internet through the terminal's screen. Any viruses deleted or files obtained by the virtual copy get added to the data collected by the terminal when the avatar logs off. But if an avatar is deleted while still online, all files and compiled virus data are deleted with it, and the avatar will be restored back on the terminal, with all saved information prior to leaving the terminal. Note: Human characters normally only need one avatar for regular use, but can have no more than three total (but the reason for having more than one needs to be a strong, logical reason). Background avatars for maintenance are permitted as NPC only, and cannot be used for anything more than plot development.
Rogue Avatars: The main description for rogue avatars are avatars not owned or operated by a user. While most avatars are programmed and operated by Human partners, also known as Users, there have been times when Avatars are created by random digital feedback from the net. The behavior of these Rogue Avatars depend on the data that created them, this also determines if they are hostile, peaceful, annoying, or as ordinary as a personal avatar. Sometimes an avatar can become rogue if a bug is found in their programming.
While these rogue avatars can be convinced to partner up with a user, many prefer to stay solo because it is easier to live without following rules. However, rogue avatars are all software, created digitally from raw data and possessing their core programming within their virtual forms. Therefore, if a rogue avatar is deleted online, they vanish forever. If out of control, these Avatars are targeted by law enforcement, to be hunted down and terminated by any means necessary. There have even been rumors of some Rogue avatars harboring dangerous viral code in their data, making the isolation and registration (or termination if necessary) of all rogue avatars high on police priority.
When rogue avatars take a more hostile path after development, they will often enter the Underground Network, the darker side of the global network used on a regular basis (a digital underworld if you will). Here in the Underground Network, the more volatile and deranged avatars make their home, and plan out ways to wreak havoc on the semi peaceful world that the humans enjoy living in so much, usually out of spite, or just for the fun of it. Getting into the Underground net is highly discouraged unless you are a trained professional, as there is only one known gateway to enter and exit.